You are on page 1of 4

Duncan, B., Happe, A. & Bratterud, A., 2016.

Enterprise IoT Security and


Scalability: How Unikernels can Improve the Status Quo. In 9th IEEE/ACM
International Conference on Utility and Cloud Computing (UCC 2016). Shanghai,
China, pp. 1–6.
Robison, W.J., 2010. Free at What Cost?: Cloud Computing Privacy Under the Stored
Communications Act. Georgetown Law Journal, 98(4), pp.1195–1239. Available at:
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1596975.
Larson, D. & Chang, V., 2016. A Review and Future Direction of Agile, Business
Intelligence, Analytics and Data Science. International Journal of Information
Management, pp.1–25.
Holland, R. et al., 2015. Quick Take: 12 Lessons For Security & Risk Pros From The
US OPM Breach. Forrester Research Inc, (Jun 8, 2015), pp.1–10. Available at:
https://www.forrester.com/Quick+Take+12+Lessons+For+Security+Risk+Pros+From+The+US+
OPM+Breach/fulltext/-/E-res123441.
Soghoian, C., 2010. Caught in the cloud: Privacy, encryption, and government back
doors in the web 2.0 era. J. on Telecomm. & High Tech. L., 8(2), pp.359–424.
Available at: http://jthtl.org/content/articles/V8I2/JTHTLv8i2_Soghoian.PDF
%5Cnhttp://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?
handle=hein.journals/jtelhtel8&section=18.
Da Xu, L., He, W. & Li, S., 2014. Internet of Things in Industries: A Survey. IEEE
Transactions on Industrial Informatics, 10(4), pp.2233–2243.
Macklin, B.W., 1999. E-Commerce at What Price? Privacy Protection in the
Information Economy. SSRN Electronic Journal, (9552699), pp.1–51. Available at:
http://www.ssrn.com/abstract=180290.
Singh, J. & Bacon, J.M., 2014. On middleware for emerging health services. Journal
of Internet Services and Applications, 5(1), p.6. Available at:
http://www.jisajournal.com/content/5/1/6.
Guttman, B. & Roback, E.A., 2011. NIST Special Publication 800-12. An Introduction
to Computer Security: The NIST Handbook, Available at:
csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf.
Cisco2014, 2014. Cisco 2014 annual security report, Available at:
http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf.
Kesan, J.P. & Gallo, A.A., 2003. Optimizing Regulation of Electronic Commerce.
Illinois Law and Economics Working Papers Series, (LE02-001), pp.1–129. Available
at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=289668.
Soghoian, C., 2011. The Law Enforcement Surveillance Reporting Gap. Social Science
Research Network, pp.1–26. Available at: http://ssrn.com/abstract=1806628.
Ohaya, C., 2006. Managing Phishing Threats in an Organization. InfoSecCD ’06:
Proceedings of the 3rd annual conference on Information security curriculum
development, pp.159–161. Available at: http://portal.acm.org/citation.cfm?
doid=1231047.1231083.
Millard, C., Walden, I. & Hon, W.K., 2012. Who is Responsible for “Personal Data”
in Cloud Computing? The Cloud of Unknowing, Part 2. Legal Studies, 27(77), pp.1–31.
Available at: http://ssrn.com/abstract=1794130.
Cisco, 2013. 2013 Cisco Annual Security Report,
Kavanagh, C. & Carrieri, M., 2012. Cyber Dialogue 2012 Briefs: Limits of Dissent in
Cyberspace. In Cyberdialogue2012. pp. 1–9.
Howard, M. & Lipner, S., 2010. Security Ddevelopment Lifecycle. Datenschutz und
Datensicherheit - DuD, 34(3), pp.135–137. Available at:
http://link.springer.com/10.1007/s11623-010-0021-7.
NIST, 2014. NIST Cloud Computing Forensic Science Challenges. , p.51.
Ali, M., Khan, S.U. & Vasilakos, A. V., 2015. Security in cloud computing:
Opportunities and challenges. Information Sciences, 305, pp.357–383. Available at:
http://dx.doi.org/10.1016/j.ins.2015.01.025.
Wei, L. et al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences, 258, pp.371–386. Available at:
http://dx.doi.org/10.1016/j.ins.2013.04.028.
Kavanagh, C. & Carrieri, M., 2012. Cyber Dialogue 2012 Briefs: Whither “Rules of
the Road” for Cyberspace? In Cyberdialogue2012. pp. 1–18.
Srinivasamurthy, S., Wayne, F. & Liu, D.Q., 2013. Security and Privacy in Cloud
Computing : A Survey Security and Privacy in Cloud Computing : In 2010 Sixth
International Conference on Semantics, Knowledge and Grids. pp. 126–149. Available
at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5663489.
Bojanova, I., Hurlburt, G. & Voas, J., 2013. Today, the Internet of Things.
Tomorrow, the Internet of Everything. Beyond that, perhaps, the Internet of
Anything - a Radically Super-Connected Ecosystem Where Questions About Security,
Trust, and Control Assume Entirely New Dimensions. information-development, p.4.
Data Protection Working Party, 2012. Opinion 05/2012 on Cloud Computing, Brussels.
Available at: http://ec.europa.eu/justice/data-protection/article-
29/documentation/opinion-recommendation/files/2012/wp196_en.pdf.
Wenge, O. et al., 2012. Much Ado about Security Appeal: Cloud Provider
Collaborations and Their Risks. Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 7592 LNCS(1), pp.80–90. Available at:
http://link.springer.com/content/pdf/10.1007/978-3-642-33427-6_6.pdf.
Lee, J. & Clifton, C., 2012. Differential Identifiability. Kdd, pp.1041–1049.
Susanto, H., Almunawar, M.N. & Tuan, Y.C., 2012. Information Security Challenge and
Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level. International
Journal of Engineering and Technology, 2(1), pp.67–75. Available at:
http://scholar.googleusercontent.com/scholar?
q=cache:2Ms1Xc36i7gJ:scholar.google.com/
+ITIL+information+security+challenges&hl=en&as_sdt=0,5.
Babar, M.A. & Chauhan, M.A., 2011. A Tale of Migration to Cloud Computing for
Sharing Experiences and Observations. Proceeding of the 2nd international workshop
on Software engineering for cloud computing - SECLOUD ’11, p.50. Available at:
http://portal.acm.org/citation.cfm?doid=1985500.1985509.
Duncan, B., Duncan, B. & Whittington, M., 2016. Enhancing Cloud Security and
Privacy : The Power and the Weakness of the Audit Trail Enhancing Cloud Security
and Privacy : The Power and the Weakness of the Audit Trail. In Cloud Computing
2016: The Seventh International Conference on Cloud Computing, GRIDs, and
Virtualization. Rome: IEEE, pp. 125–130.
Pasquier, T.F.J. et al., 2013. Information Flow Audit for PaaS Clouds.
Bugnion, E. et al., 2012. Bringing Virtualization to the x86 Architecture with the
Original VMware Workstation. ACM Transactions on Computer Systems ACM Reference
Format: Bugnion, ACM Trans. Comput. Syst, 30(12), p.51.
Yang, J. & Chen, Z., 2010. Cloud Computing Research and Security Issues. Computing,
pp.10–12. Available at: http://www.scopus.com/inward/record.url?eid=2-s2.0-
79951629965&partnerID=40&md5=26612afab22ab45b61795892582f5ef8.
Bacon, J. et al., 2014. Information Flow Control for Secure Cloud Computing. IEEE
Transactions on Network and Service Management, 11(1), pp.76–89. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6701293.
Wang, C. et al., 2010. Privacy-Preserving Public Auditing for Data Storage Security
in Cloud Computing. In IEEE INFOCOM 2010. pp. 362–375.
Berman, F., 2010. We Need a Research Data Census. Communications of the ACM,
53(12), pp.39–41. Available at: http://portal.acm.org/citation.cfm?
doid=1859204.1859220 [Accessed October 24, 2011].
Moore, T., Clayton, R. & Anderson, R., 2009. The Economics of Online Crime. Journal
of Economic Perspectives, 23(3), pp.3–20. Available at:
http://pubs.aeaweb.org/doi/abs/10.1257/jep.23.3.3.
Sharma, S. et al., 2016. Cloud-based Emerging Services Systems. International
Journal of Information Management, pp.1–19. Available at:
http://linkinghub.elsevier.com/retrieve/pii/S0268401216301608.
Duncan, B. & Whittington, M., 2014. Compliance with Standards, Assurance and Audit:
Does this Equal Security? In Proceedings of the 7th International Conference on
Security of Information and Networks. Glasgow: ACM, pp. 77–84.
Trend, 2011. A Look Back at 2011,
Haimes, Y.Y. et al., 2015. Assessing systemic risk to cloud-computing technology as
complex interconnected systems of systems. Systems Engineering, 18(3), pp.284–299.
Ion, I. et al., 2011. Home is Safer than the Cloud! Privacy Concerns for Consumer
Cloud Storage. In Proceedings of the Seventh Symposium on Usable Privacy and
Security - SOUPS ’11. p. 1. Available at: http://dl.acm.org/citation.cfm?
id=2078827.2078845.
Pearson, S. & Charlesworth, A., 2009. Accountability as a way forward for privacy
protection in the cloud. Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 5931
LNCS(December), pp.131–144. Available at:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.406.4389.
Ruebsamen, T. & Reich, C., 2013. Supporting Cloud Accountability by Collecting
Evidence Using Audit Agents. In Proceedings of the International Conference on
Cloud Computing Technology and Science, CloudCom. pp. 185–190.
Pearson, S. & Benameur, A., 2010. Privacy, Security and Trust Issues Arising from
Cloud Computing. In 2010 IEEE Second International Conference on Cloud Computing
Technology and Science. Ieee, pp. 693–702. Available at:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5708519 [Accessed May
28, 2013].
Pearson, S., 2009. Taking account of privacy when designing cloud computing
services. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges
of Cloud Computing, CLOUD 2009, pp.44–52. Available at:
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5071532.
Xu, G. et al., 2015. A cloud computing based system for cyber security management.
International Journal of Parallel, Emergent and Distributed Systems, 30(1), pp.29–
45. Available at: http://dx.doi.org/10.1080/17445760.2014.925110.
Dlamini, M., Eloff, J. & Eloff, M., 2009. Information security: The moving target.
Computers & Security, 28(3–4), pp.189–198. Available at:
http://www.sciencedirect.com/science/article/pii/S0167404808001168 [Accessed August
2, 2013].
Zeller, M. et al., 2009. Open Standards and Cloud Computing KDD-2009 Panel Report.
Exchange Organizational Behavior Teaching Journal, pp.11–18.
Alhamad, M. et al., 2010. Response Time for Cloud Computing Providers. Response,
pp.8–10. Available at: http://dl.acm.org/citation.cfm?id=1967579.
Doelitzscher, F. et al., 2012. Validating Cloud Infrastructure Changes By Cloud
Audits. In Proceedings - 2012 IEEE 8th World Congress on Services, SERVICES 2012.
pp. 377–384.
Ralston, P.A.S., Graham, J.H. & Hieb, J.L., 2007. Cyber security risk assessment
for SCADA and DCS networks. ISA Transactions, 46(4), pp.583–594. Available at:
http://linkinghub.elsevier.com/retrieve/pii/S0019057807000754 [Accessed June 10,
2013].
Swire, P.P., 1999. Financial Privacy and the Theory of High-Tech Government
Surveillance. Washington University Law Review, 77(2), pp.461–512. Available at:
http://www.ssrn.com/abstract=133340.
Chang, V., Kuo, Y.-H. & Ramachandran, M., 2015. Cloud Computing Adoption Framework:
A security framework for business clouds. Future Generation Computer Systems, 57,
pp.24–41. Available at:
http://www.sciencedirect.com/science/article/pii/S0167739X15003118.
Chang, V. & Ramachandran, M., 2016. Towards Achieving Data Security with the Cloud
Computing Adoption Framework. , 9(1), pp.138–151.
Pasquier, T., Shand, B. & Bacon, J., 2013. Information Flow Control for a Medical
Records Web Portal. Cl.Cam.Ac.Uk, pp.1–8. Available at:
http://www.cl.cam.ac.uk/research/srg/opera/publications/papers/2013TPasqPortal.pdf.
Chang, V. & Ramachandran, M., 2015. Towards achieving Data Security with the Cloud
Computing Adoption Framework. IEEE Transactions on Services Computing, 1374(c),
pp.1–1. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?
arnumber=7299312.
Tene, O., 2011. Privacy: The New Generations. International Data Privacy Law, 1(1),
pp.15–27. Available at: http://ssrn.com/abstract=1710688.
Pearson, S., 2013. Privacy and Security for Cloud Computing. In Privacy and
Security for Cloud Computing. e: Springer, pp. 3–42. Available at:
http://link.springer.com/10.1007/978-1-4471-4189-1.
PWC, 2014. Managing cyber risks in an interconnected world Key findings from The
Global State of Information Security® Survey 2015, Available at:
www.pwc.com/gsiss2015.
Hayes, B., 2008. Cloud computing. Communications of the ACM, 51(7), p.9. Available
at: http://portal.acm.org/citation.cfm?doid=1364782.1364786 [Accessed July 9,
2011].
Susanto, H., Almunawar, M.N. & Tuan, Y.C., 2011. Information Security Management
System Standards: A Comparative Study of the Big Five. International Journal of
Electrical Computer Sciences IJECSIJENS, 11/5(October), pp.23–29. Available at:
http://www.ijens.org/vol_11_i_05/113505-6969-ijecs-ijens.pdf.
Neumann, P. & Contributors, 1988. Risks to the public. ACM SIGSOFT Software
Engineering Notes, 13(4), pp.3–20. Available at: http://dl.acm.org/citation.cfm?
id=2674632.2674635 [Accessed August 17, 2011].
Gantz, J.F. et al., 2007. The Expanding Digital Universe: A Forecast of Worldwide
Information Growth Through 2010. External Publication of IDC (Analyse the Future)
Information and Data, pp.1–21.
Happe, A., Duncan, B. & Bratterud, A., 2016. Unikernels for Cloud Architectures:
How Single Responsibility can Reduce Complexity, Thus Improving Enterprise Cloud
Security. In Accepted by Complexis 2017. pp. 1–8.
Xiao, Z. & Xiao, Y., 2013. Security and Privacy in Cloud Computing. Communications
Surveys Tutorials, IEEE, 15(2), pp.843–859.
Lorünser, T., Andreas Happe & Slamanig, D., 2015. ARCHISTAR: Towards Secure and
Robust Cloud Based Data Sharing. IEEE 7th International Conference on Cloud
Computing Technology and Science, CloudCom 2015, Vancouver, November 30 - December
3, pp.371–378.
Smith, H.J., 2002. Ethics and Information Systems: Resolving the Quandaries. ACM
SIGMIS Database, 33(3), pp.8–22. Available at: http://dl.acm.org/ft_gateway.cfm?
id=569908&type=pdf&CFID=55565498&CFTOKEN=25090791.
Pasquier, T.F.J. et al., 2015. Managing Big Data with Information Flow Control. In
Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International
Conference. pp. 1–8.
Heiser, G. et al., 2010. The Road to Trustworthy Systems. Legacy, pp.3–9. Available
at:
http://doi.acm.org/10.1145/1867635.1867638%5Cnhttp://www.cse.unsw.edu.au/~leonidr/.
Gal-Or, E. & Ghose, A., 2004. The Economic Consequences of Sharing Security
Information. Economics of information security, pp.95--104. Available at:
http://pages.stern.nyu.edu/~aghose/Infosec_Book.pdf.
Duncan, B. & Whittington, M., 2016. Cyber Security for Cloud and the Internet of
Things: How Can it be Achieved ? Submitted to IET, pp.1–20.

You might also like